This popular open source web server has some serious security flaws

OpenLiteSpeed ​​Web Server, the world-famous open source web serverIt carried a few very dangerous vulnerabilities, experts warned.

Researchers from Unit 42, the cybersecurity research arm of Palo Alto Networks, note that threat actors who have been able to exploit these flaws will be granted full privileged remote code execution capabilities.

The team found that the OpenLiteSpeed ​​web server carries three high-severity vulnerabilities, namely CVE-2022-0073 (severity 8.8, high-severity remote code execution), and CVE-2022-0074 (high-severity privilege escalation flaw 8.8) .), and CVE-2022-0072 (to 5.8, a medium-severity directory traversal defect). The vulnerabilities also affected the enterprise edition, LiteSpeed ​​Web Server.

patch ready

Unit 42 notified LiteSpeed ​​Technologies of its findings which subsequently corrected the defects, released new versions of the server, and urged users to update their software immediately.

We urge organizations using OpenLiteSpeed ​​versions 1.5.11 – 1.7.16, as well as LiteSPeed versions 5.4.6 – 6.0.11 to bring endpoints (Opens in a new tab) Up to 1.7.16.1 and 6.0.12 ASAP.

According to Unit 42, LiteSpeed ​​web server is the sixth most popular web server worldwide, serving approximately 2% of all web server applications, with approximately 1.9 million unique servers worldwide.

The researchers explained in Blog Posts (Opens in a new tab).

“This research resulted in the finding of three vulnerabilities that affect both enterprise and open source solutions. They can be linked and exploited by an adversary with Admin Control Panel credentials, in order to gain code execution privilege on vulnerable components.”

Web servers have come a long way in terms of security and protection, concluded Unit 42, adding that despite the optimistic outlook, vulnerabilities are still being found due to the rapid pace of technological development.

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version